IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

EMC World 2015: '30 billion connected devices by 2020'

Storage firm predicts 44 zettabytes of data will be produced in five years time

Over 44 zettabytes of data will be created by seven billion people and 30 billion devices connected to the internet by 2020, according to EMC.

Speaking at a keynote speech at EMC World in Las Vegas, the storage firm's CEO of information infrastructure, David Goulden, compared that figure to the 2.8 zettabytes produced in 2012.

One zettabyte is equal to a billion terabytes, while EMC's devices prediction surpasses Gartner's forecast by 5 billion units.

He said that all generations could be categorised by the technology they used, from baby boomers with their Filofaxes and mobiles to "generation Z" with wearables and the Internet of Things (IoT).

But the point Goulden tried to get across was that all of these generations form what he called the "Information Generation".

He said that the world is transforming into a community of digital citizens that are part of a global network, this meaning that organisations must redefine themselves by adopting a digital mindset.

"We are going forwards and not backwards as more people become comfortable with using cloud, social and mobile," he said.

To meet their needs, businesses need to focus on a number of core areas such as agile innovation, delivering real-time experiences and predicting new ways to serve customers, he added.

EMC is working on delivering products and services based on what he called a "third platform" to help do this.

By helping customers increase growth, manage risk and reduce cost, EMC and its federation companies could help remove CIO pain points that were a result of an arrival of technology in the workplace, the firm claims.

This chimes with what analyst firm IDC identified as the third platform that is built on mobile, cloud, big data and social.

IDC predicted that this would form the new core of market growth in technology, adding that this third platform would account for one third of ICT spending this year.

Goulden said that as a result of the third platform, the security industry would also undergo dramatic change.

"Comparing second platform applications, these were static systems relatively and that's where firewalls and anti-virus software came in as the main solution," he claimed.

"These applications were used within the enterprises and therefore security challenges were more manageable."

But with the third platform, "apps are often connecting all employees, all partners and anybody else who wants to come into the enterprise via a smartphone".

However, third platform firms cannot keep hackers out as easily as earlier, more simple platforms, EMC said, and to overcome these threats businesses would have to adopt big data analytics to find and fight malicious activity on the network.

"The two biggest challenges in security are big data challenges and these are based on intelligence," said Goulden.

"Firstly, how do you securely authenticate people coming onto the network? The second challenge is identifying the anomalies happening in the network in real time."

He pointed out that the number of data breaches happening over the last few years has resulted in many firms deploying analytics products from RSA.

"We are a generation ahead of people at this. Every public breach occurring in recent memory has been at companies using competitors [products]. Many have since moved to RSA."

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Recommended

Twilio account breach result of sophisticated social engineering campaign
Security

Twilio account breach result of sophisticated social engineering campaign

9 Aug 2022
Over 200,000 DrayTek routers vulnerable to total device takeover
Security

Over 200,000 DrayTek routers vulnerable to total device takeover

3 Aug 2022
Data on 69 million Neopets users stolen and listed for sale on hacker forum
Security

Data on 69 million Neopets users stolen and listed for sale on hacker forum

21 Jul 2022
HackerOne employee fired for using position to steal bug bounties
Security

HackerOne employee fired for using position to steal bug bounties

4 Jul 2022

Most Popular

Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
Cyber attack on software supplier causes "major outage" across the NHS
cyber attacks

Cyber attack on software supplier causes "major outage" across the NHS

8 Aug 2022